EP3661830A1 - Konzept zum überwachen eines an ein stellwerk eingehenden netzwerkverkehrs - Google Patents
Konzept zum überwachen eines an ein stellwerk eingehenden netzwerkverkehrsInfo
- Publication number
- EP3661830A1 EP3661830A1 EP18781963.6A EP18781963A EP3661830A1 EP 3661830 A1 EP3661830 A1 EP 3661830A1 EP 18781963 A EP18781963 A EP 18781963A EP 3661830 A1 EP3661830 A1 EP 3661830A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- network
- interlocking
- network traffic
- incoming
- command
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B61—RAILWAYS
- B61L—GUIDING RAILWAY TRAFFIC; ENSURING THE SAFETY OF RAILWAY TRAFFIC
- B61L19/00—Arrangements for interlocking between points and signals by means of a single interlocking device, e.g. central control
- B61L19/06—Interlocking devices having electrical operation
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B61—RAILWAYS
- B61L—GUIDING RAILWAY TRAFFIC; ENSURING THE SAFETY OF RAILWAY TRAFFIC
- B61L27/00—Central railway traffic control systems; Trackside control; Communication systems specially adapted therefor
- B61L27/20—Trackside control of safe travel of vehicle or train, e.g. braking curve calculation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/04—Processing captured monitoring data, e.g. for logfile generation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/06—Generation of reports
- H04L43/062—Generation of reports related to network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0876—Network utilisation, e.g. volume of load or congestion level
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/12—Network monitoring probes
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B61—RAILWAYS
- B61L—GUIDING RAILWAY TRAFFIC; ENSURING THE SAFETY OF RAILWAY TRAFFIC
- B61L19/00—Arrangements for interlocking between points and signals by means of a single interlocking device, e.g. central control
- B61L19/06—Interlocking devices having electrical operation
- B61L2019/065—Interlocking devices having electrical operation with electronic means
Definitions
- the invention relates to an apparatus and a method for monitoring a network traffic incoming to a signal box of a railway operating installation via a communications network.
- the invention further relates to a computer program.
- ⁇ sets In a control center of a railway operating system usually computer workstations for the setting of driving ⁇ roads and to monitor a railway traffic are ⁇ sets.
- interlocking can be reached, for example, via a communications network.
- the object underlying the invention is therefore to be seen in an efficient concept for the efficient monitoring of an interlocking a railway operating system via a Communications network to provide incoming network traffic.
- an apparatus for monitoring network traffic incoming to a railway facility interlocking over a communications network comprising:
- a network TAP to read the incoming network traffic via the communication network to the interlocking and to output the included incoming network traffic to a processor for checking the included incoming network traffic
- a network separator for separating the interlocking from the communications network
- the processor is configured to control the network separation device based on a Er ⁇ result of checking the included incoming network traffic such that the network separation device separates the interlocking of the communication network.
- a method of monitoring network traffic incoming to a railway facility interlocking over a communications network comprising the following steps:
- a computer program which contains program code for carrying out the method. rens for monitoring a network traffic incoming to an interlocking of a railway operating system via a communication network, when the computer program is executed on a computer, for example on the device for monitoring network traffic incoming to a signaling system of a railway operating system via a communications network.
- the invention is based on the finding that the above object is achieved by a network TAP reading the incoming network traffic and outputting it to a processor for checking the incoming network traffic. Depending on a result of the checking, the interlocking is then disconnected from the communication network or not.
- the use of the network TAP offers the technical advantage that it is invisible in the communication network and therefore can not be recognized and attacked by any attacker.
- ALG application le- vel gateway
- the interlocking is separated from the communication network, in particular the technical advantage be ⁇ acts that the interlocking can then no longer be achieved via the communication network ⁇ tion. Attackers can thus no longer attack the signal box via the communication network.
- the interlocking is advantageously protected against attacks via the communication network efficiently.
- a network TAP in the sense of the description establishes a passive access point to a network connection, with which the data signals transmitted over the network connection
- a network TAP is called “network TAP” in English.
- the abbreviation “TAP” stands for "test access port”.
- a network TAP in the sense of the description operates on the OSI layer 1 (OSI layer 1) and has no MAC address.
- the network TAP is thus invisible in the communication network.
- the network TAP may also be referred to as a passive network TAP insofar as it establishes the passive access point described above.
- the network TAP may also be referred to as an Ethernet TAP.
- the processor is designed to check the included incoming network traffic, to check a command stream included in the incoming network traffic for unauthorized commands, and to trigger the network disconnection device in the event of detection of an unauthorized command in such a way that the
- Network separation device separates the interlocking of the communication network.
- the processor is designed for checking the command current to compare details of the command current with reference commands of a Ne ⁇ gativkommandoliste to detect unauthorized commands.
- the negative command list thus forms a so-called "black list”. Commands that are encompassed by the negative command list are therefore illegal commands.
- a Protokollinri device for logging the read network traffic.
- the technical advantage for example, that at a later date can be efficiently demonstrated that, for example, unauthorized commands to the Interlocking were sent respectively that the unauthorized commands corresponding unauthorized operations could be success ⁇ rich prevented.
- the protocol device records the network traffic included, ie stores it.
- the network TAP is designed to output the provided incoming network traffic to the protocol device.
- the processor is designed to output the included incoming network traffic to the protocol device.
- the network separation device is designed to physically separate the interlocking from the communication network. This causes, for example, the technical advantage that an efficient and safe separation of the interlocking from the communication network is effected.
- the physical disconnect includes physically disconnecting a communication link between the network TAP and the interlocking.
- the physical disconnection comprises opening a switch which is connected in a communication connection between the communication network and the interlocking, for example between the network TAP and the interlocking.
- a Gayandoeinspeise worn for feeding a test commands in the Lucas- Henden network traffic in order to test the processor, wherein the processor is configured, upon detection of the test commands as part of checking the mitêten turned ⁇ Henden network traffic no control of the supply disconnecting to perform direction such that the network separation device separates the interlocking of the communication network.
- this has the technical advantage of enabling efficient testing of the processor.
- the command injection device is designed to feed the test command at predetermined time intervals.
- Such a predetermined time interval is selected, for example, depending on the requirements of the application. Examples of play is provided that the test command once per second or once per minute or once an hour a ⁇ is fed. For example, the time interval from ei ⁇ nem official auditor is given.
- the processor is configured, upon detection of the test command in the context of checking the included incoming network traffic ei ⁇ ne success message to the command input device to send that the test command was detected, the command mandoeinfeise worn is formed, if not a success message after feeding the test command to control the network separation device such that the
- Network separation device separates the interlocking of the communication network.
- the technical advantage is caused that an error in the processor, which leads to a non-recognition of the test command, does not have a safety-critical impact. tions to operation of the interlocking. This is because in such a case, ie when a success message remains from ⁇ , the interlocking is separated from the communication network.
- the network separation means is controlled accordingly by means of the Kirandoeinspeise worn to separate the interlocking of the Kommunikati ⁇ onsnetzwerk, in particular the technical advantages will be in part causes the actuator ⁇ factory yet separated when an error occurs in the processor of the communication network can be .
- the device is designed to monitor a network traffic incoming to a signal box of a railway operating installation via a communications network, to carry out or carry out the method for monitoring network traffic incoming to a signal box of a railway operating installation via a communications network.
- a railroad facility includes the interlocking and the apparatus for monitoring network traffic incoming to an interlocking of a railroad facility over a communications network.
- the method comprises that the reading of the network traffic arriving via the communication network to the controller is carried out by means of the network TAP.
- the mit arrestede incoming network traffic is output to the pro cessor ⁇ , for example by means of the network TAPs.
- to check the included incoming network traffic is provided to check a Kirandostrom included in the included incoming network traffic for unauthorized commands and in egg nem detection of unauthorized commands to control the network separation device such that the network separation device separates the interlocking of the communication network.
- the method provides for checking the command stream that commands the command ⁇ stream with reference commands a negative command list are ver ⁇ adjusted to detect unauthorized commands.
- the interlocking is physically separated from the communication network by means of the network separation device.
- a feeding of a test command into the incoming network traffic is provided to test the processor, wherein upon detection of the test command by the processor in the context of testing the included incoming network power, the processor does not control the power disconnecting device such that the network disconnecting device separates the signal box from the communication network.
- the processor sends a success message to the command injection device upon detection of the test command as part of checking the included incoming network traffic, that the test command has been detected, the command input device, in the absence of a success message after feeding the test command
- Network separation device controls such that the network separation device separates the interlocking of the communication network.
- the command injection device is designed, in the absence of the success message after feeding the test command after a predetermined period of time to control the network separation device such that the network separation device separates the interlocking of the communication network.
- the Wienoeinspeise issued the expiry of predetermined time period waits after feeding the test commands, before the grid separating device is so attached ⁇ controlled that the mains separation device separates the switchboard of the communication network if the success message fails to appear.
- long wait before it disconnects after the failure of the success message depends on the In ⁇ mentation, that the specific case, from.
- the network disconnecting device is activated immediately after the expiry of the specific time interval in such a way that the time interval (the predetermined time period) under any possible operating conditions a response should occur
- Network separator separates the interlocking of the communication network, if the success message fails
- the interlocking is connected via a VPN router to the communication network or can be connected.
- a VPN router is provided for a connection of the signal box with the communication network.
- the control box is connected to the VPN router, for example.
- the network TAP is connected between the VPN router and the interlocking.
- a computer of a control center of the railway operating system can be connected via the communication network to the interlocking or is connected.
- ⁇ form a computer of a control center of Eisenbahnbe ⁇ operating system.
- the computer of the control center of the railway operating system is connected to the communication network via a further VPN router or can be connected.
- another VPN router is provided for a connection of the computer of the control center to the communication network is.
- the computer is connected to the other VPN router.
- the communication network comprises the Internet.
- the communication network comprises a mobile radio network.
- the computer of the control center according to an exporting ⁇ approximate shape formed as a workstation, for example, as a loading serving workstation.
- Anlvesge through the computer of the control center of the Eisenbahn serves-, for example, or can for example be specified differently, which state should have the signals of the Eisenbahnbe ⁇ operating system respectively which state res ⁇ pektive position a switch operation of the railway plant ha ⁇ ben should respectively by means of the computer a Travel allowances specified.
- the possible messages of a signal box include free and busy messages of track subs ⁇ sections and / or flank protection of points.
- the command flow is transmitted in the form of PDS and / or SBS telegrams.
- PDS process data interface
- SBS standard operating interface
- the command stream is a command stream of one of the following network protocols: SSH, SFTP, SMB.
- Unauthorized command in the sense of the description is at ⁇ play, a command release.
- Such a command ⁇ free transfer causes in the switchboard canceling system states respectively overdriving of the interlocking. That means in particular that it is ⁇ enables the command "command enable" to override the signal box to be able to continue, for example, a train service with reduced security, if there were, for example, a fault in the signal box, which has led to a blockade ,
- command release is the case that although a signal indicates "red", a drive command is issued to the driver or an entrance to a track section is released even though the track section is already indicated as busy Command release, so it will override the security monitoring.
- an apparatus for monitoring network traffic incoming to an interlocking of a railroad facility via a communications network does not comprise the interlocking.
- the interlocking is reconnected to the communication network.
- the further predetermined period of time for example, greater than 1 minute, for example greater than 2 minutes.
- a KF action must be completed, otherwise it will be recognized as invalid.
- the network separation device is designed to connect the interlocking again with the communication network after a further predetermined period of time.
- the processor is designed to control the power disconnecting device after a further predetermined period of time such that this
- Network separation device is designed to disconnect the interlocking reversibly from the communication network.
- Network separation device is designed to disconnect the interlocking irreversibly from the communication network.
- the network separator To connect communication network, for example, the network separator must be replaced.
- FIG. 3 shows a third apparatus for monitoring a to a signal box operating a railway system via a Kommunikati ⁇ onsnetztechnik incoming network traffic
- FIG. 4 shows a flowchart of a method for monitoring a network traffic incoming to a signal box of a railway operating installation via a communications network.
- FIG. 1 shows a first device 101 for monitoring a network traffic incoming to a signal box of a railway operating installation via a communications network.
- the first device 101 comprises: a network TAP 103 for reading the incoming network traffic to the interlocking via the communication network and for outputting the included incoming network traffic to a processor 105 for checking the incoming network traffic included in the network,
- a network separator 107 for separating the interlocking from the communication network
- processor 105 is configured to control the network separator 107 based on a result of checking the included incoming network traffic such that that the network separator 107 separates the interlocking from the communication network.
- FIG. 1 further shows a signal box 109 of a railway operating system (not shown in further detail), which is connected to a communications network 113 via a VPN router 111.
- the communication network 113 is, according to one embodiment, the Internet.
- the 1 shows an operator workstation 115 of a control center not shown here, the Eisenbahnbe ⁇ operating system.
- the operator workstation 115 is connected to the communication network 113 via a further VPN router 117.
- VPN router 117 the Internet as a possible communication network
- the device 101 is installed in accordance ei ⁇ ner embodiment in the local network of a customer and must therefore, for example, not necessarily via the Internet and VPN router to the signal box 109 to be connected.
- the network TAP 103 is connected between the VPN router 111 and the interlocking 109.
- the network separator 107 is connected between the network TAP 103 and the interlocking 109.
- the network TAP 103 reads a command stream, which is sent from the VPN router 111 to the signal box 109, and outputs the read command stream to the processor 105.
- the Network TAP 103 thus reads the incoming network signal 109 to the network traffic (command stream).
- the processor 105 checks the command current, which is transmitted egg ner according to the embodiment in the form of PDS and / or SBS telegrams respectively on unauthorized commands respectively uner ⁇ laubte command sequences unauthorized command types, for example a release command. Recognizes the processor 105 such command type respekti ⁇ ve command sequence, respectively, an illegal command, steu ⁇ ert the processor 105, the network separation device 107 in such a way that the grid separation means 107 separates the network connection between the network TAP 103 and the interlocking 109th
- the signal box 109 is disconnected from the communication network 113.
- Signaling 109 which assumes responsibility for safety, to be monitored before any change to signals or routes respectively driving permits takes place. This usually applies to all commands except those that are called "command release”. Such commands override the interlocking 109.
- Signal box 109 are installed, bypassed, which can represent an increased risk in the event of a deliberate or unintentional incorrect operation. This applies, for example, to se especially if such commands or can be triggered by a Fernbedie ⁇ voltage willingly unwillingly.
- the command stream which is sent, for example, from the operator workstation 115 via the communication network 113 to the interlocking 109, is read and output to the processor 105 for the purpose of checking.
- the processor 105 may thus check this command current to commands of the type "command ⁇ release" in an advantageous manner and activate the power separator 107 on recognizing such a command.
- Characterized in particular the technical advantage thus will be ⁇ acts to deliberate or by a correspondingly unin ⁇ schreibte misoperation no increased risk takes place, at least one corresponding risk can be reduced.
- the fact that the network TAP 103 is not visible in the network, it can not be attacked and optionally disabled.
- the center may be reached 109 over the communication network 113, which is required for example by customers a ⁇ .
- additional protection measures required by the new safety legislation will be implemented efficiently.
- FIG. 2 shows a second device 201 for monitoring a network traffic incoming to a signal box of a railway operating installation via a communications network.
- the second device 201 is designed substantially analogously to the first device 101 according to FIG.
- the second device 201 comprises a protocol device 205 for logging the read network traffic.
- the network TAP 103 is formed so far, bengle- the mitgelese ⁇ NEN network traffic to the protocol device 205th
- the protocol device 205 By means of the protocol device 205, it is possible in an advantageous manner to be able to prove at a later point in time whether the command stream comprises unauthorized commands.
- the protocol device 205 is designed to record a separation of the signal box 109 from the communication network 113. Logging includes, for example, a save.
- FIG. 3 shows a third device 301 for monitoring a network traffic incoming to a signal box of a railway operating installation via a communications network.
- the third device 301 is designed substantially analogously to the second device 201 according to FIG.
- the third device 301 also comprises according to FIG 3 a Kom ⁇ mandoeinspeise worn 303 for supplying a test commands in the incoming network traffic to test the processor 105th
- the processor 105 is then formed, upon detection of the test commands in the frame by the testing ⁇ fens of mitangeen incoming network traffic no actuation of the mains isolating device 107 to carry out such that the mains isolating device 107, the interlocking separates from the communication network engine 113 109th
- the third device 301 does not include the protocol device 205. According to this embodiment, the third device 301 is then designed substantially analogously to the first device 101 according to FIG. According to this embodiment, the third device 301 then includes the command injection device 303 in addition to the first device 101 shown in FIG.
- the processor 105 is formed, upon detection of the test commands in Rah ⁇ men of checking the incoming network traffic mitiliaen to send a success message to the Kirandoeinspeise owned 303 that the test command is detected, wherein the Kirandoeinspeise worn 303 is formed, in the absence of a success message after feeding the test commands, in particular in the absence of a success message after feeding the test commands after a réelle ⁇ agreed period of time, for example, a maximum of 3 s, the
- Net separator 107 separates the interlocking 109 of the communication network 113.
- an apparatus for monitoring a network traffic incoming to a signal box of a railway operating installation via a communications network comprises the signal box.
- an apparatus for monitoring network traffic incoming to an interlocking of a railroad facility via a communications network does not comprise the interlocking.
- FIG. 4 shows a flow chart of a method for surveil a ⁇ chen to a signal box operating a railway system via a communication network incoming network traffic, comprising the steps of:
- the method shown and described in FIG. 4 is carried out or executed by means of one of the three devices 101, 201, 303.
- the read-ahead 401 is performed by means of the network TAPs 103.
- the network TAP 103 for example, outputs the read network traffic to the processor 105.
- the checking 403 is performed by means of the processor 105, for example.
- the separation 405 is performed, for example, by means of the Netztrennein ⁇ direction 107.
- the processor 105 controls the network separator 107 accordingly.
- the interlocking 109 is connected to the communication network 113 again.
- the network separation device 107 is formed, after expiry of a predetermined Zeitdau ⁇ he to connect the interlocking 109 again with the communication network 113.
- the processor is positioned forms ⁇ 105 to connect after a predetermined time period, the positioner 109 to the communication network 113th
- Net separator 107 is formed to separate the interlocking 109 reversibly from the communication network 113.
- Net separator 107 is formed to disconnect the interlocking 109 irreversibly from the communication network 113.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mechanical Engineering (AREA)
- Data Mining & Analysis (AREA)
- Environmental & Geological Engineering (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Train Traffic Observation, Control, And Security (AREA)
Abstract
Description
Claims
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PL18781963T PL3661830T3 (pl) | 2017-09-29 | 2018-09-06 | Koncepcja do monitorowania ruchu sieciowego nadchodzącego do nastawni |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| DE102017217422.6A DE102017217422A1 (de) | 2017-09-29 | 2017-09-29 | Konzept zum Überwachen eines an ein Stellwerk eingehenden Netzwerkverkehrs |
| PCT/EP2018/073989 WO2019063259A1 (de) | 2017-09-29 | 2018-09-06 | Konzept zum überwachen eines an ein stellwerk eingehenden netzwerkverkehrs |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| EP3661830A1 true EP3661830A1 (de) | 2020-06-10 |
| EP3661830B1 EP3661830B1 (de) | 2021-11-10 |
Family
ID=63722341
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| EP18781963.6A Active EP3661830B1 (de) | 2017-09-29 | 2018-09-06 | Konzept zum überwachen eines an ein stellwerk eingehenden netzwerkverkehrs |
Country Status (8)
| Country | Link |
|---|---|
| US (1) | US20200236028A1 (de) |
| EP (1) | EP3661830B1 (de) |
| CN (1) | CN111163992A (de) |
| DE (1) | DE102017217422A1 (de) |
| ES (1) | ES2905641T3 (de) |
| HU (1) | HUE057844T2 (de) |
| PL (1) | PL3661830T3 (de) |
| WO (1) | WO2019063259A1 (de) |
Family Cites Families (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN100531051C (zh) * | 2006-03-13 | 2009-08-19 | 华为技术有限公司 | 通信网络及终端业务与网络分离的实现方法 |
| US8831011B1 (en) * | 2006-04-13 | 2014-09-09 | Xceedium, Inc. | Point to multi-point connections |
| ES2354632T3 (es) * | 2006-06-03 | 2011-03-16 | B. BRAUN MEDIZINELEKTRONIK GMBH & CO. KG | Dispositivo y procedimiento para la protección de un aparato médico y de un paciente tratado con dicho aparato, contra influencias peligrosas procedentes de una red de comunicaciones. |
| KR20100027104A (ko) * | 2007-04-05 | 2010-03-10 | 인터내셔널 비지네스 머신즈 코포레이션 | 방화벽을 구축하는 방법, 시스템 및 컴퓨터 프로그램 |
| CN101729592B (zh) * | 2008-10-29 | 2013-08-07 | 中国移动通信集团公司 | 一种分布式通信网络、设备及通信网络分离方法 |
| US8248958B1 (en) * | 2009-12-09 | 2012-08-21 | Juniper Networks, Inc. | Remote validation of network device configuration using a device management protocol for remote packet injection |
| CN201584766U (zh) * | 2009-12-11 | 2010-09-15 | 谢树奎 | Adsl调制解调器保护器 |
| DE102013219698A1 (de) * | 2013-09-30 | 2015-04-02 | Siemens Aktiengesellschaft | Filtern eines Datenpaketes durch eine Netzwerkfiltereinrichtung |
| DE102015201278B4 (de) * | 2015-01-26 | 2016-09-29 | Continental Automotive Gmbh | Steuersystem |
-
2017
- 2017-09-29 DE DE102017217422.6A patent/DE102017217422A1/de not_active Withdrawn
-
2018
- 2018-09-06 US US16/650,446 patent/US20200236028A1/en not_active Abandoned
- 2018-09-06 PL PL18781963T patent/PL3661830T3/pl unknown
- 2018-09-06 EP EP18781963.6A patent/EP3661830B1/de active Active
- 2018-09-06 CN CN201880062580.3A patent/CN111163992A/zh active Pending
- 2018-09-06 ES ES18781963T patent/ES2905641T3/es active Active
- 2018-09-06 HU HUE18781963A patent/HUE057844T2/hu unknown
- 2018-09-06 WO PCT/EP2018/073989 patent/WO2019063259A1/de not_active Ceased
Also Published As
| Publication number | Publication date |
|---|---|
| WO2019063259A1 (de) | 2019-04-04 |
| PL3661830T3 (pl) | 2022-03-14 |
| CN111163992A (zh) | 2020-05-15 |
| HUE057844T2 (hu) | 2022-06-28 |
| EP3661830B1 (de) | 2021-11-10 |
| DE102017217422A1 (de) | 2019-04-04 |
| US20200236028A1 (en) | 2020-07-23 |
| ES2905641T3 (es) | 2022-04-11 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP1062787B1 (de) | Lokales netzwerk, insbesondere ethernet-netzwerk, mit redundanzeigenschaften sowie redundanzmanager | |
| DE19952527C2 (de) | Verfahren und Transaktionsinterface zum gesicherten Datenaustausch zwischen unterscheidbaren Netzen | |
| EP3001884B1 (de) | Verfahren, vorrichtung und system zur überwachung einer sicherheits-netzübergangseinheit | |
| EP2866387A1 (de) | Bussystem und Verfahren zum Betreiben eines solchen Bussystems | |
| EP3295645B1 (de) | Verfahren und anordnung zur rückwirkungsfreien übertragung von daten zwischen netzwerken | |
| WO2018162176A1 (de) | Verfahren und vorrichtungen zur übertragung von daten zwischen einem ersten netz und einem zweiten netz eines schienenfahrzeugs | |
| DE102011086726B4 (de) | Verfahren zur redundanten Kommunikation zwischen einem Nutzer-Terminal und einem Leitsystem-Server | |
| EP3122016B1 (de) | Automatisierungsnetzwerk und verfahren zur überwachung der sicherheit der übertragung von datenpaketen | |
| EP3028409B1 (de) | Filtern eines datenpaketes durch eine netzwerkfiltereinrichtung | |
| EP1862931B1 (de) | Vorrichtung und Verfahren zum Schutz eines medizinischen Geräts und eines von diesem Gerät behandelten Patienten vor gefährdenden Einflüssen aus einem Kommunikationsnetzwerk | |
| EP3661830A1 (de) | Konzept zum überwachen eines an ein stellwerk eingehenden netzwerkverkehrs | |
| EP1104609A2 (de) | Bussystem | |
| DE202015004439U1 (de) | Überwachungsvorrichtung und Netzwerkteilnehmer | |
| EP1675342B1 (de) | Vorrichtung und Verfahren zur sicheren Fehlerbehandlung in geschützten Kommunikationsnetzen | |
| WO2015062812A1 (de) | Sicherheitsrelevantes system mit supervisor | |
| EP3957033B1 (de) | Rechenanlage und verfahren zum betreiben einer rechenanlage | |
| EP4300883A1 (de) | Netzwerkadapter geeignet zum unterstützen eines berechtigten sendens und/oder empfangens von daten | |
| WO2014191179A1 (de) | Verfahren und vorrichtung zum filtern eines datenpaketes | |
| DE10207527A1 (de) | Lokales Netzwerk, insbesondere Ethernet-Netzwerk, mit Redundanzeigenschaften sowie Koppelgerät für ein derartiges Netzwerk | |
| EP3607437B1 (de) | Verfahren zum konfigurieren zumindest eines geräts eines schienenfahrzeugs in einem netzwerk, computerprogramm und computerlesbares speichermedium | |
| LU501035B1 (de) | Verfahren und System zum Absichern des Austausches von Daten in einem Netzwerksystem für industrielle Steuerungen | |
| WO2013034188A1 (de) | Verfahren zum betreiben einer netzwerkkomponente in einem kommunikationsnetzwerk und netzwerkkomponente | |
| EP3603011B1 (de) | Vorrichtungen und verfahren zum betreiben einer mobilfunkkommunikation mit einer streckenseitigen einrichtung | |
| AT526785A4 (de) | Vorrichtung zum anlassbezogenen Unterbrechen einer zwei Netzwerkschnittstellen verbindenden Signalleitung | |
| DE102021133657A1 (de) | Verfahren und System zum Absichern des Austausches von Daten in einem Netzwerksystem für industrielle Steuerungen |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: UNKNOWN |
|
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
| PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
| 17P | Request for examination filed |
Effective date: 20200303 |
|
| AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
| AX | Request for extension of the european patent |
Extension state: BA ME |
|
| DAV | Request for validation of the european patent (deleted) | ||
| DAX | Request for extension of the european patent (deleted) | ||
| REG | Reference to a national code |
Ref country code: DE Ref legal event code: R079 Ref document number: 502018007815 Country of ref document: DE Free format text: PREVIOUS MAIN CLASS: B61L0027000000 Ipc: H04L0012260000 |
|
| GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: GRANT OF PATENT IS INTENDED |
|
| RIC1 | Information provided on ipc code assigned before grant |
Ipc: H04L 12/26 20060101AFI20210517BHEP Ipc: B61L 19/06 20060101ALI20210517BHEP Ipc: B61L 27/00 20060101ALI20210517BHEP |
|
| INTG | Intention to grant announced |
Effective date: 20210602 |
|
| GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
| GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE PATENT HAS BEEN GRANTED |
|
| AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
| REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D Free format text: NOT ENGLISH |
|
| REG | Reference to a national code |
Ref country code: AT Ref legal event code: REF Ref document number: 1447084 Country of ref document: AT Kind code of ref document: T Effective date: 20211115 Ref country code: CH Ref legal event code: EP |
|
| REG | Reference to a national code |
Ref country code: DE Ref legal event code: R079 Ref document number: 502018007815 Country of ref document: DE Free format text: PREVIOUS MAIN CLASS: H04L0012260000 Ipc: H04L0043000000 |
|
| REG | Reference to a national code |
Ref country code: DE Ref legal event code: R096 Ref document number: 502018007815 Country of ref document: DE |
|
| REG | Reference to a national code |
Ref country code: IE Ref legal event code: FG4D Free format text: LANGUAGE OF EP DOCUMENT: GERMAN |
|
| REG | Reference to a national code |
Ref country code: NL Ref legal event code: FP |
|
| REG | Reference to a national code |
Ref country code: LT Ref legal event code: MG9D |
|
| REG | Reference to a national code |
Ref country code: ES Ref legal event code: FG2A Ref document number: 2905641 Country of ref document: ES Kind code of ref document: T3 Effective date: 20220411 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: RS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20211110 Ref country code: LT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20211110 Ref country code: FI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20211110 Ref country code: BG Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220210 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220310 Ref country code: SE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20211110 Ref country code: PT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220310 Ref country code: NO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220210 Ref country code: LV Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20211110 Ref country code: HR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20211110 Ref country code: GR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220211 |
|
| REG | Reference to a national code |
Ref country code: HU Ref legal event code: AG4A Ref document number: E057844 Country of ref document: HU |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SM Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20211110 Ref country code: SK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20211110 Ref country code: RO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20211110 Ref country code: EE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20211110 Ref country code: DK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20211110 Ref country code: CZ Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20211110 |
|
| REG | Reference to a national code |
Ref country code: DE Ref legal event code: R097 Ref document number: 502018007815 Country of ref document: DE |
|
| PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
| 26N | No opposition filed |
Effective date: 20220811 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: AL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20211110 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20211110 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MC Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20211110 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LU Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20220906 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20220906 Ref country code: FR Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20220930 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: CY Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20211110 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20211110 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20211110 |
|
| REG | Reference to a national code |
Ref country code: DE Ref legal event code: R081 Ref document number: 502018007815 Country of ref document: DE Owner name: SIEMENS MOBILITY GMBH, DE Free format text: FORMER OWNER: SIEMENS MOBILITY GMBH, 81739 MUENCHEN, DE |
|
| PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: PL Payment date: 20250828 Year of fee payment: 8 Ref country code: IT Payment date: 20250924 Year of fee payment: 8 Ref country code: NL Payment date: 20250902 Year of fee payment: 8 |
|
| PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: BE Payment date: 20250918 Year of fee payment: 8 |
|
| PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: AT Payment date: 20250818 Year of fee payment: 8 |
|
| REG | Reference to a national code |
Ref country code: CH Ref legal event code: U11 Free format text: ST27 STATUS EVENT CODE: U-0-0-U10-U11 (AS PROVIDED BY THE NATIONAL OFFICE) Effective date: 20251210 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: TR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20211110 |
|
| PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: HU Payment date: 20251121 Year of fee payment: 8 |
|
| PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: DE Payment date: 20251120 Year of fee payment: 8 |
|
| PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: GB Payment date: 20251002 Year of fee payment: 8 |
|
| PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: CH Payment date: 20251210 Year of fee payment: 8 |
|
| PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: ES Payment date: 20251219 Year of fee payment: 8 |